Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM |
2009-05-28 13:25 |
Kagawa |
Kagawa University |
Security management for university network in distributed environment
-- An Approach of Kagawa University for Security-based Computer Network Management in Distributed Campus Environment -- Kazuyoshi Kawauchi, Kazutoshi Sone, Masahide Kawaguchi, Takanori Doi, Yoshiro Imai, Zengo Furukawa (Kagawa Univ.) ICM2009-2 |
This report presents an approach of security measures for Kagawa University and its results during a few months monitori... [more] |
ICM2009-2 pp.7-10 |
IN, NS (Joint) |
2009-03-03 08:40 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
A Bridge Type Firewall System for Management of Networks including Productive Equipments Yusuke Koike, Hisayoshi Kunimune, Masaaki Niimura, Yasushi Fuwa (Shinshu Univ.) NS2008-155 |
Companies have a requirement to conduct IT internal control with expanding use of their company networks. However, it is... [more] |
NS2008-155 pp.69-74 |
IA |
2009-01-29 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
BISCAL: Bit Vector Based Spatial Calculus for Analyzing the Mis-configurations in Firewall policies Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi (Nagoya Inst of Tech.) IA2008-65 |
Packet filtering in firewalls operates at the network level of the OSI model, or the IP layer of TCP/IP. In a packet fil... [more] |
IA2008-65 pp.101-106 |
IN |
2008-02-15 12:40 |
Kagawa |
Kagawa University |
A Filter Reverse Search System for LANs with Stateful Firewalls Kazuaki Hida, Yoshiaki Katayama, Naohisa Takahashi (NITECH) IN2007-153 |
In this paper, we propose a filter reverse search system for LANs with stateful firewalls.
The proposed system detects ... [more] |
IN2007-153 pp.65-70 |
LOIS, ICM, IA (Joint) |
2008-01-25 14:30 |
Kumamoto |
Sojo Univ. (Kumamoto) |
A Study for Firewall Traversal method by TCP Splicing Ichiro Yamaguchi, Yuichi Ishikawa, Masahiro Jibiki (NEC) TM2007-49 |
Recently, VPN technology is used to improve secure capability in Internet remote access and end users. In enterprise ... [more] |
TM2007-49 pp.39-43 |
IN |
2007-06-21 16:20 |
Hokkaido |
Future University-Hakodate |
[Invited Talk]
Technical trend on Videoconference and evolution to Tele Presence for NGN Atsuhisa Suzuki (OKI) IN2007-14 |
Video Conference is again having an attention as Tele-Presence is demonstrated on NGN. I will explain evolving technolog... [more] |
IN2007-14 pp.19-24 |
NS, IN (Joint) |
2007-03-09 14:10 |
Okinawa |
Okinawa Convention Center |
A Bridge Type Firewall System and the Method of Remote Control via Networks Naoyuki Ishida, Hisayoshi Kunimune, Masaaki Niimura, Yasushi Fuwa (Shinshu Univ.) NS2006-198 |
A gateway type firewall system is generally utilized to protect local area network. To introduce a gateway type firewal... [more] |
NS2006-198 pp.207-210 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:25 |
Okayama |
Okayama Univ. |
IDS for SSL Enncrypted Web Traffic Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.) |
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] |
ISEC2006-32 SITE2006-29 pp.167-173 |
ISEC, LOIS |
2005-11-15 09:40 |
Fukuoka |
Kitakyushu Science and Research Park |
Dynamic Access Control Method for Ad-Hoc Information Sharing Yoichiro Morita, Masayuki Nakae, Ryuichi Ogawa (NEC) |
This paper proposes a context-based access control model CBAC that can handle temporal access control of ad-hoc group me... [more] |
ISEC2005-99 OIS2005-62 pp.7-14 |
CS, IN, NS (Joint) |
2005-09-15 09:50 |
Miyagi |
Tohoku Univ. |
A control-fowarding separated node using a hardware packet transferring Toshiyuki Sudo, Takeshi Kawasaki, Naoki Oguchi, Takeshi Kodama, Tetsumei Tsuruoka (Fujitsu Ltd.) |
As an effective means of improving performance and function of the packet forwarding node in a network, we propose a com... [more] |
CS2005-18 pp.13-18 |
NS, RCS (Joint) |
2005-07-21 17:20 |
Okayama |
Okayama Univ.(Tsushima Campus) |
[Encouragement Talk]
Evaluation of the service quality change due to the dynamic policy control with authentication information Seiichi Sakaya, Tetsuya Oh-ishi, Hidefumi Nakamura (NTT) |
It is the feature that a terminal communicates directly in end-end communication. However, the firewall of the former re... [more] |
NS2005-68 pp.29-32 |
IN |
2005-07-15 11:40 |
Hokkaido |
Hokkaido University |
Anomaly Detection Mechanism for Wide Area Network Takashi Isobe (Hitachi), Yoshinori Watanabe, Hidemitsu Higuchi, Takeshi Aimoto (AlaxalA), Kenichi Yoshida (Univ. of Tsukuba) |
Anomalous flows such as worm and DDoS attacks are becoming the cause of a trouble on both local area networks and wide a... [more] |
IN2005-47 pp.109-114 |
NS |
2005-04-22 13:25 |
Aichi |
Nanzan-Univ. |
A Study of Network-based Firewall for Mobile IP and NEMO Yoshikazu Nakamura, Takeshi Ogawa, Tadashi Itoh (NTT) |
In order to defend various communication of a variety of terminal efficiently, network-based firewall is effective. When... [more] |
NS2005-19 pp.29-32 |
NS, OCS |
2005-01-27 14:20 |
Kagoshima |
Kagoshima Univ. |
A dynamic policy control framework of IP network based on the session control information Seiichi Sakaya, Kumiko Ono, Hidefumi Nakamura (NTT) |
These days, end-to-end real-time communication services, such as voice over IP, are getting popular, while security cons... [more] |
NS2004-180 OCS2004-140 pp.1-4 |
NS, CS, IN |
2004-09-03 10:55 |
Miyagi |
Tohoku University |
Proposal of the authenticated type firewall using Hierarchical Mobile IPv6 Yuji Yamada, Kazuhide Koide, Gen Kitagata, Norio Shiratori (Tohoku Univ.) |
When a certain node moves in a network, due to network Security Policy, it becomes impossible to access the network. Alt... [more] |
NS2004-112 IN2004-71 CS2004-67 pp.61-66 |